Surveying the Hardware Trojan Threat Landscape for the Internet-of-Things. Venugopalan, V. & Patterson, C. Journal of Hardware and Systems Security, April, 2018. Paper doi abstract bibtex The Internet-of-Things (IoT) has emerged as one of the most innovative multidisciplinary paradigms combining heterogeneous sensors, software architectures, embedded hardware systems, and data analytics. With the growth in deployment of IoT systems, security of the sensors and trustworthiness of the data exchanged is of paramount significance. IoT security approaches are derived from the vulnerabilities existing in cyber-physical systems (CPS) and the countermeasures designed against them. This paper surveys the vulnerabilities posed due to the presence of hardware Trojans in such IoT-based CPS. The threats, trigger points, detection methods, and countermeasures for targeting hardware Trojans are discussed in detail. Finally, some of the new emerging security challenges and countermeasures are addressed.
@article{Venugopalan2018Surveying-,
abstract = {The Internet-of-Things (IoT) has emerged as one of the most innovative multidisciplinary paradigms combining heterogeneous sensors, software architectures, embedded hardware systems, and data analytics. With the growth in deployment of IoT systems, security of the sensors and trustworthiness of the data exchanged is of paramount significance. IoT security approaches are derived from the vulnerabilities existing in cyber-physical systems (CPS) and the countermeasures designed against them. This paper surveys the vulnerabilities posed due to the presence of hardware Trojans in such IoT-based CPS. The threats, trigger points, detection methods, and countermeasures for targeting hardware Trojans are discussed in detail. Finally, some of the new emerging security challenges and countermeasures are addressed.},
author = {Venugopalan, Vivek and Patterson, Cameron},
date-added = {2021-01-30 10:23:38 -0500},
date-modified = {2021-01-30 10:23:38 -0500},
day = {30},
doi = {10.1007/s41635-018-0037-2},
issn = {2509-3436},
journal = {Journal of Hardware and Systems Security},
month = apr,
title = {{Surveying the Hardware Trojan Threat Landscape for the Internet-of-Things}},
url = {https://doi.org/10.1007/s41635-018-0037-2},
year = {2018},
Bdsk-File-1 = {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},
Bdsk-Url-1 = {https://doi.org/10.1007/s41635-018-0037-2}}
Downloads: 0
{"_id":"LrTe8D9iMqbt8u4yf","bibbaseid":"venugopalan-patterson-surveyingthehardwaretrojanthreatlandscapefortheinternetofthings-2018","author_short":["Venugopalan, V.","Patterson, C."],"bibdata":{"bibtype":"article","type":"article","abstract":"The Internet-of-Things (IoT) has emerged as one of the most innovative multidisciplinary paradigms combining heterogeneous sensors, software architectures, embedded hardware systems, and data analytics. With the growth in deployment of IoT systems, security of the sensors and trustworthiness of the data exchanged is of paramount significance. IoT security approaches are derived from the vulnerabilities existing in cyber-physical systems (CPS) and the countermeasures designed against them. This paper surveys the vulnerabilities posed due to the presence of hardware Trojans in such IoT-based CPS. The threats, trigger points, detection methods, and countermeasures for targeting hardware Trojans are discussed in detail. Finally, some of the new emerging security challenges and countermeasures are addressed.","author":[{"propositions":[],"lastnames":["Venugopalan"],"firstnames":["Vivek"],"suffixes":[]},{"propositions":[],"lastnames":["Patterson"],"firstnames":["Cameron"],"suffixes":[]}],"date-added":"2021-01-30 10:23:38 -0500","date-modified":"2021-01-30 10:23:38 -0500","day":"30","doi":"10.1007/s41635-018-0037-2","issn":"2509-3436","journal":"Journal of Hardware and Systems Security","month":"April","title":"Surveying the Hardware Trojan Threat Landscape for the Internet-of-Things","url":"https://doi.org/10.1007/s41635-018-0037-2","year":"2018","bdsk-file-1":"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","bdsk-url-1":"https://doi.org/10.1007/s41635-018-0037-2","bibtex":"@article{Venugopalan2018Surveying-,\n\tabstract = {The Internet-of-Things (IoT) has emerged as one of the most innovative multidisciplinary paradigms combining heterogeneous sensors, software architectures, embedded hardware systems, and data analytics. With the growth in deployment of IoT systems, security of the sensors and trustworthiness of the data exchanged is of paramount significance. IoT security approaches are derived from the vulnerabilities existing in cyber-physical systems (CPS) and the countermeasures designed against them. This paper surveys the vulnerabilities posed due to the presence of hardware Trojans in such IoT-based CPS. The threats, trigger points, detection methods, and countermeasures for targeting hardware Trojans are discussed in detail. Finally, some of the new emerging security challenges and countermeasures are addressed.},\n\tauthor = {Venugopalan, Vivek and Patterson, Cameron},\n\tdate-added = {2021-01-30 10:23:38 -0500},\n\tdate-modified = {2021-01-30 10:23:38 -0500},\n\tday = {30},\n\tdoi = {10.1007/s41635-018-0037-2},\n\tissn = {2509-3436},\n\tjournal = {Journal of Hardware and Systems Security},\n\tmonth = apr,\n\ttitle = {{Surveying the Hardware Trojan Threat Landscape for the Internet-of-Things}},\n\turl = {https://doi.org/10.1007/s41635-018-0037-2},\n\tyear = {2018},\n\tBdsk-File-1 = {YnBsaXN0MDDSAQIDBFxyZWxhdGl2ZVBhdGhZYWxpYXNEYXRhXxA1Li4vLi4vLi4vcmVmZXJlbmNlcy9QREYvVmVudWdvcGFsYW4yMDE4U3VydmV5aW5nLS5wZGZPEQHaAAAAAAHaAAIAAAxNYWNpbnRvc2ggSEQAAAAAAAAAAAAAAAAAAADV6sfdSCsAAAAWf3AdVmVudWdvcGFsYW4yMDE4U3VydmV5aW5nLS5wZGYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJEhRdcNzkQAAAAAAAAAAAADAAMAAAkgAAAAAAAAAAAAAAAAAAAAA1BERgAAEAAIAADV6wAdAAAAEQAIAADXDgaEAAAAAQAUABZ/cAAWf2gAFn3cAAaLhgACZvcAAgBTTWFjaW50b3NoIEhEOlVzZXJzOgB2aXZla3Y6AERyb3Bib3g6AHJlZmVyZW5jZXM6AFBERjoAVmVudWdvcGFsYW4yMDE4U3VydmV5aW5nLS5wZGYAAA4APAAdAFYAZQBuAHUAZwBvAHAAYQBsAGEAbgAyADAAMQA4AFMAdQByAHYAZQB5AGkAbgBnAC0ALgBwAGQAZgAPABoADABNAGEAYwBpAG4AdABvAHMAaAAgAEgARAASAEFVc2Vycy92aXZla3YvRHJvcGJveC9yZWZlcmVuY2VzL1BERi9WZW51Z29wYWxhbjIwMThTdXJ2ZXlpbmctLnBkZgAAEwABLwAAFQACAA3//wAAAAgADQAaACQAXAAAAAAAAAIBAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAI6},\n\tBdsk-Url-1 = {https://doi.org/10.1007/s41635-018-0037-2}}\n\n","author_short":["Venugopalan, V.","Patterson, C."],"bibbaseid":"venugopalan-patterson-surveyingthehardwaretrojanthreatlandscapefortheinternetofthings-2018","role":"author","urls":{"Paper":"https://doi.org/10.1007/s41635-018-0037-2"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://bibbase.org/f/R3LGkkqj3uPfqr3NM/vivekv-isi-edu.bib","dataSources":["i5A8jKqyW67R7nn75","oodiEqv3HQNeZtGeC"],"keywords":[],"search_terms":["surveying","hardware","trojan","threat","landscape","internet","things","venugopalan","patterson"],"title":"Surveying the Hardware Trojan Threat Landscape for the Internet-of-Things","year":2018}